Optimization of Lattice-Based Cryptographic Key Generation using Genetic Algorithms for Post-Quantum Security

Authors

  • Tara Nawzad Ahmad Al Attar Department of Computer Science, College of Science, University of Sulaimani, Sulaymaniyah, Iraq.
  • Rebaz Nawzad Mohammed Department of Computer Science, College of Science, University of Sulaimani, Sulaymaniyah, Iraq.

DOI:

https://doi.org/10.21928/uhdjst.v9n1y2025.pp93-105

Keywords:

Cryptographic Security, Genetic Algorithm, Key Optimization, Lattice-Based Cryptography, Post-Quantum Cryptography

Abstract

The progress of quantum computing has posed serious threats to classical cryptographic systems, necessitating much research into developing post-quantum cryptography (PQC). Of the schemes available in PQC, the strongest candidates appear to be lattice-based cryptography (LBC), which encompasses an ample security basis and good computation efficiency. However, practically implementing LBC is faced with key-generation and optimization difficulties, mainly because of its enormous key sizes and computational overhead. The research proposes a novel concept whereby genetic algorithms (GAs) are blended with LBC to increase the merits of key generation while guaranteeing security. Through the evolutionary capacity of GAs, the proposed method optimizes lattice-based keys through selection, crossover, and mutation to ensure high entropy and computationally feasible with experimental results indicating that the GA-based method can cut down memory requirements and computational complexity, making it favorable for resource-constrained environments such as the Internet of Things and embedded systems. The method thus suggested accelerates encryption speed and simultaneously strengthens the security of the optimized key structures. This study emphasizes evolutionary algorithms’ potential to facilitate PQC advancement and provides a scalable and efficient framework for cryptographic systems.

References

F. Bova, A. Goldfarb and R. G. Melko. “Commercial applications of quantum computing”. EPJ Quantum Technology, vol. 8, no. 1, p. 2, 2021.

M. R. Khan, K. Upreti, M. I. Alam, H. Khan, S. T. Siddiqui, M. Haque and J. Parashar. “Analysis of elliptic curve cryptography & RSA”. Journal of ICT Standardization, vol. 11, no. 4, pp. 355-378, 2023.

F. Kappel and A. V. “Kuntsevich. An implementation of Shor’s r-algorithm”. Computational Optimization and Applications, vol. 15, pp. 193-205, 2000.

T. N. A. Al Attar, M. A. Mohammed and R. N. Mohammed. “Exploring post-quantum cryptography: Evaluating algorithm resilience against global quantum threats”. UHD Journal of Science and Technology, vol. 9, no. 1, pp. 18-28, 2025.

A. Khalid, S. McCarthy, M. O’Neil and W. Liu. “Lattice-based Cryptography for IoT in a Quantum World: Are We Ready?” In: 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI). IEEE, 2019.

North American Numbering Plan. National Institute of Standards and Technology (NIST). Available on: https://www.nationalnanpa. com/. [Last accessed on 2025 Apr 12].

X. Wang, G. Xu and Y. Yu. “Lattice-based cryptography: A survey”. Chinese Annals of Mathematics, Series B, vol. 44, no. 6, pp. 945-960, 2023.

J. Yao and V. Zimmer. “Cryptography”. In: Building Secure Firmware: Armoring the Foundation of the Platform. Springer, Cham, pp. 767-823, 2020.

R. Chaudhary, G. S. Aujla, Member, N. Kumar and S. Zeadally. “Lattice-based public key cryptosystem for internet of things environment: Challenges and solutions”. IEEE Internet of Things Journal, vol. 6, no. 3. pp. 4897-4909, 2018.

M. Yasuda. “A Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP Challenge”. In: International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019. Springer, Singapore, 2021.

R. Lindner and C. Peikert. “Better key sizes (and attacks) for LWE-based encryption”. In: Topics in Cryptology-CT-RSA 2011: The Cryptographers’ Track at the RSA Conference 2011, Proceedings. Springer, San Francisco, CA, USA, 2011.

S. Farooq, A. Altaf, F. Iqbal, E. B. Thompson, D. L. R. Vargas, I. d. l. T. Díez, and I. Ashraf, “Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms,” Sensors, vol. 23, no. 12, p. 5379, 2023.

J. H. Holland. “Genetic algorithms”. Scientific American, vol. 267, no. 1, pp. 66-73, 1992.

J. H. Holland. “Building blocks, cohort genetic algorithms, and hyperplane-defined functions”. Evolutionary Computation, vol. 8, no. 4, pp. 373-391, 2000.

S. Farooq, A. Altaf, F. Iqbal, E. B. Thompson, D. L. R. Vargas, I. de la Torre Díez and I. Ashraf. “Resilience optimization of post-quantum cryptography key encapsulation algorithms”. Sensors (Basel), vol. 23, no. 12, p. 5379, 2023.

M. A. Khan, S. Javaid, S. A. H. Mohsan, M. Tanveer and I. Ullah. “Future-proofing security for UAVs with post-quantum cryptography: A review”. IEEE Open Journal of the Communications Society, vol. 5, pp. 6849-6871, 2024.

J. Xie, W. Zhao, H. Lee, D. B. Roy and X. Zhang. “Hardware circuits and systems design for post-quantum cryptography-A tutorial brief”. IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 71, no. 3, pp. 1670-1676, 2024.

C. Näther, D. Herzinger, S. L. Gazdag, J. P. Steghöfer, S. Daum and D. Loebenberger. “Migrating software systems towards post-quantum cryptography-a systematic literature review”. IEEE Access, vol. 12, pp. 132107-132126, 2024.

A. Aydeger, E. Zeydan, A. K. Yadav, K. T. Hemachandra and M. Liyanage. “Towards a Quantum-resilient Future: Strategies for Transitioning to Post-quantum Cryptography”. In: 2024 15th International Conference on Network of the Future (NoF). IEEE, 2024.

H. Nejatollahi, N. Dutt, S. Ray, F. Regazzoni, I. Banerjee and R. Cammarota. “Post-quantum lattice-based cryptography implementations: A survey”. ACM Computing Surveys, vol. 51, no. 6, pp. 1-41, 2019.

A. Kaushik, L. S. S. Vadlamani, M. M. Hussain, M. Sahay, R. Singh, A. K. Singh, S. Indu, P. Goswami and N. G. V. Kousik. “Post quantum public and private key cryptography optimized for IoT security”. Wireless Personal Communications, vol. 129, no. 2, pp. 893-909, 2023.

R. Asif. “Post-quantum cryptosystems for Internet-of-Things: A survey on lattice-based algorithms”. IoT, vol. 2, no. 1, pp. 71-91, 2021.

S. Koteshwara, M. Kumar and P. Pattnaik. “Performance Optimization of Lattice post-Quantum Cryptographic Algorithms on Many-core Processors”. In: 2020 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE, 2020.

E. Alkim, L. Ducas, T. Pöppelmann and P. Schwabe. “Post-quantum Key {Exchange-A} New Hope”. In: 25th USENIX Security Symposium (USENIX Security 16). 2016.

A. Gagnidze, M. Iavich, and G. Iashvili. “Analysis of post quantum cryptography use in practice”. Bulletin of the Georgian National Academy of Sciences, vol. 11, no. 2, pp. 29-36, 2017.

Z. Liu, K. K. R. Choo and J. Grossschadl. “Securing edge devices in the post-quantum internet of things using lattice-based cryptography”. IEEE Communications Magazine, vol. 56, no. 2, pp. 158-162, 2018.

C. A. Roma, C. E. A. Tai and M. A. Hasan. “Energy efficiency analysis of post-quantum cryptographic algorithms”. IEEE Access, vol. 9, pp. 71295-71317, 2021.

M. Kumar and P. Pattnaik. “Post Quantum Cryptography (pqc)-an Overview”. In: 2020 IEEE High Performance Extreme Computing Conference (HPEC). IEEE, 2020.

M. Balachandran, S. Devanathan, R. Muraleekrishnan annd S. S. Bhagawan. “Optimizing properties of nanoclay-nitrile rubber (NBR) composites using face centred central composite design”. Materials & Design, vol. 35, pp. 854-862, 2012.

Published

2025-04-20

How to Cite

Al Attar, T. N. A., & Mohammed, R. N. (2025). Optimization of Lattice-Based Cryptographic Key Generation using Genetic Algorithms for Post-Quantum Security. UHD Journal of Science and Technology, 9(1), 93–105. https://doi.org/10.21928/uhdjst.v9n1y2025.pp93-105

Issue

Section

Articles